Sciweavers

1207 search results - page 153 / 242
» Towards optimal k-anonymization
Sort
View
CASCON
1996
118views Education» more  CASCON 1996»
13 years 11 months ago
Automatic parallelization for symmetric shared-memory multiprocessors
The trend in workstation hardware is towards symmetric shared-memory multiprocessors (SMPs). User expectations are for (largely) automatic exploitation of parallelismon an SMP, si...
Jyh-Herng Chow, Leonard E. Lyon, Vivek Sarkar
DBSEC
2010
128views Database» more  DBSEC 2010»
13 years 9 months ago
On the Identification of Property Based Generalizations in Microdata Anonymization
Abstract. Majority of the search algorithms in microdata anonymization restrict themselves to a single privacy property and a single criteria to optimize. The solutions obtained ar...
Rinku Dewri, Indrajit Ray, Indrakshi Ray, Darrell ...
AUTOMATICA
2008
82views more  AUTOMATICA 2008»
13 years 9 months ago
Iterative minimization of H2 control performance criteria
Data-based control design methods most often consist of iterative adjustment of the controller's parameters towards the parameter values which minimize an H2 performance crit...
Alexandre S. Bazanella, Michel Gevers, Ljubisa Mis...
AUTOMATICA
2006
94views more  AUTOMATICA 2006»
13 years 9 months ago
Subspace identification for FDI in systems with non-uniformly sampled multirate data
This paper proposes a novel subspace approach towards direct identification of a residual model for fault detection and isolation (FDI) in a system with non-uniformly sampled mult...
Weihua Li, Zhengang Han, Sirish L. Shah
IJNSEC
2008
152views more  IJNSEC 2008»
13 years 9 months ago
Group Key Management in MANETs
Specific applications like military or public emergency ones require secure group communication in ad hoc environments. The most suitable solution to provide the expected level of...
Mohamed Salah Bouassida, Isabelle Chrisment, Olivi...